[go: up one dir, main page]

CN102955916B - The method of protection digital content and storage device - Google Patents

The method of protection digital content and storage device Download PDF

Info

Publication number
CN102955916B
CN102955916B CN201110247095.3A CN201110247095A CN102955916B CN 102955916 B CN102955916 B CN 102955916B CN 201110247095 A CN201110247095 A CN 201110247095A CN 102955916 B CN102955916 B CN 102955916B
Authority
CN
China
Prior art keywords
user
key
digital content
terminal
storage device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201110247095.3A
Other languages
Chinese (zh)
Other versions
CN102955916A (en
Inventor
林意纹
林维和
程苑晴
林伟振
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mxtran Inc
Original Assignee
Mxtran Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mxtran Inc filed Critical Mxtran Inc
Priority to CN201110247095.3A priority Critical patent/CN102955916B/en
Publication of CN102955916A publication Critical patent/CN102955916A/en
Application granted granted Critical
Publication of CN102955916B publication Critical patent/CN102955916B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The embodiment of the present invention discloses the protection method of digital content and storage device, and the method comprises: user's terminal sends a requirement about digital content with the user's identification code in storage device to server; User's terminal downloads a signature file of a digital content file and the one second cipher mode encryption providing one first cipher mode encryption to storage device from server; In storage device, by signature file deciphering to capture the first key and one second key, and with the first secret key decryption digital content file at least partially, and the second key is more sent to user's terminal by storage device, for the other parts of user's terminal deciphering digital content file.

Description

The method of protection digital content and storage device
Technical field
The present invention relates to method and the storage device of protection digital content.
Background technology
Only allow to have the digital content in user's accessing storing device of authority to protect digital content, prior art has many methods, such as the TrustedFlash of Sandisk company tMsecurityTechnology, its details can obtain http://www.sandisk.com/business-solutions/technology/trustedfla sh-security-technology-faqs by following network address.In addition also can with reference to U.S. Patent Application Publication No. US2003/0217217, US2010/0229004, US2010/0095383 and United States Patent (USP) 7761717.Above content is incorporated to herein all by reference.
Summary of the invention
The one side of the embodiment of the present invention, be the digital content file loading storage device, in advance through encryption, and the information of deciphering required for this digital content file or parameter (such as key), also encrypt in advance separately, and be together loaded on digital content storage device (hereinafter referred to as storage device).Accordingly, storage device needs first to be decrypted the information required for this digital content file of deciphering, could be decrypted digital content file more afterwards.Especially, for the information required for this digital content file of deciphering, its encryption can utilize the information or parameter (such as key) that are specific to this storage device, also namely only could decipher by this storage device.
The another aspect of the embodiment of the present invention, is to load the digital content file of storage device, in advance through encrypting, and deciphers this digital content file and needs two keys.Accordingly, storage device provides this two keys, wherein storage device uses one a part for secret key decryption digital content file, and another key is supplied to the user's terminal linked with storage device, be decrypted by the other parts of user's terminal according to another double secret key digital content file.
The another aspect of the embodiment of the present invention, be the digital content file of above-mentioned loading storage device and the information of deciphering required for this digital content file, be encrypted by long-range server, therefore server dynamically or randomly sets and encrypts to digital content file the parameter used, and the parameter being specific to this storage device also can be utilized to be encrypted the information required for this digital content file of deciphering simultaneously.
According to one embodiment of the invention, disclose a kind of method protecting digital content, comprise the following step:
● user's exterior of terminal links storage device, and user's terminal obtains the user's identification code with encrypted private key from storage device;
● user's terminal transmits user's identification code of encryption to server;
● server uses the PKI corresponding with private key with user's identification code of enabling decryption of encrypted, and response user identification code, server provides enciphered data, wherein enciphered data comprises the signature file with the digital content file of the first cipher mode encryption and the encryption of the second cipher mode, and wherein the second cipher mode uses above-mentioned PKI;
● this user's terminal from this server download this enciphered data to this digital content storage device; And
● in digital content storage device, carry out the following step:
This signature file is deciphered to capture the first key and the second key with this private key by ■;
■ is according to a part for first this digital content file of secret key decryption;
■ transmits this second key to this user's terminal;
● user's terminal is according to the other parts of the second secret key decryption digital content file.
According to another embodiment of the present invention, disclose a kind of method being produced protection digital content by a server, comprise the following step:
● server receive that user terminal sends with user's identification code of encrypted private key;
● server uses the PKI corresponding with private key to decipher user's identification code of its encryption, and response user identification code, server provides enciphered data, wherein enciphered data comprises the signature file with the digital content file of the first cipher mode encryption and the encryption of the second cipher mode, and wherein the second cipher mode uses public-key; And
● server provides user's terminal downloads enciphered data.
It should be noted that in addition, in above-mentioned two embodiments, optionally, storage device can store a digital authenticating, wherein comprise above-mentioned PKI, and this digital authenticating can send server in the lump in company with user's identification code, or first send server in the initialized stage, thus server can obtain PKI, but server also obtains this PKI in advance by other mode.
According to one embodiment of the invention, disclose a kind of digital content storage device, comprise:
● connecting interface, can externally link user's terminal;
● memory cell, stores enciphered data, and enciphered data comprises the signature file with the digital content file of the first cipher mode encryption and the encryption of the second cipher mode;
● key unit, by the deciphering of this signature file to capture at least the first key; And
● controller unit, links memory cell and key unit, the communication of controller unit control store unit and this user's terminal room respectively, and according to the first secret key decryption digital content file at least partially.
According to another embodiment of the present invention, disclose a kind of digital content storage device, comprise:
● connecting interface, externally can link user's terminal;
● memory cell, stores a digital content file of encryption;
● key unit, provides the first key and the second key; And
● controller unit, link memory cell and key unit respectively, the communication of controller unit control store unit and user's terminal room, and according to the first secret key decryption digital content file at least partially, and transmit the second key to user's terminal, thus this user's terminal is according to the other parts of the second secret key decryption digital content file.
With reference to following explanation and enclose claim or utilize as hereafter the embodiments of the present invention carried, can more understand these characteristics of the present invention and advantage.
Accompanying drawing explanation
In order to understand advantage of the present invention immediately, please refer to certain specific embodiments as shown in drawings, describing brief the present invention described above in detail.When understanding these diagrams and only describe exemplary embodiments of the present invention and not therefore being regarded as the restriction scope of the invention, the present invention is described, in graphic with reference to accompanying drawing with extra definition and details:
Fig. 1 is a kind of storage device schematic diagram according to the present invention one specific embodiment;
Fig. 2 is a kind of system architecture diagram according to the present invention one specific embodiment;
Fig. 3 is a kind of process flow diagram according to the present invention one specific embodiment.
Primary clustering symbol description
100 storage device 102 connecting interfaces
104 memory cell 106 key unit
108 controller unit 110 stored value card unit
112 authentication ' unit 200 user terminals
300 server 400 networks
AP application program DC digital authenticating
DS digital signature DF digital content file
SF signature file K1, K2 key
Embodiment
< digital content storage device >
Fig. 1 shows embodiment of the present invention storage device 100.Though storage device 100 is shown as in Fig. 1 USB storage device so that the present invention to be described, but storage device 100 also can be embodied as the storage device of other type, such as flash type memory card (such as SD card, CF card etc.), solid state hard disc (SSD), magnetic storage device or optical disc drive.
As shown in Figure 1, storage device 100 has connecting interface 102, memory cell 104, key unit 106, controller unit 108.Connecting interface 102 is in order to link user's terminal 200 (being such as personal computer or mobile communications device), and the connecting interface in the present invention can be wired or wireless connecting interface, and except USB interface, also can be SATA, PCIe or ISO7816 interface.It should be noted that in addition, in some cases, connecing 102 may also need breakout box (such as card reader (cardreader)) to link user's terminal 200.
Memory cell 104 is in order to store the enciphered data of the following stated herein, and in this embodiment, memory cell 104 comprises nand flash memory, but the present invention is not limited thereto.
Key unit 106, it can be embodied as a microprocessor, provide a key management system to provide and to store one or many key in order to encrypt/decrypt, and in order to provide key, key unit 106 can have more the function of deciphering.After more details will be described in.
Controller unit 108, link memory cell 104, it also can be embodied as a microprocessor, in order to data write and the reading of control store unit 104, and the data communication between control store unit 104 and user's terminal 200.About this part, the flash controller that can provide with reference to existing Qunlian Electronic Co., Ltd ( http:// www.phison.com/English/ProductList_Controller.asp? SortID=1 & Sort path=0,1,), do not repeated herein.But controller unit 108 and above-mentioned existing Memory Controller difference, be that controller unit 108 has more the function of deciphering, after this part will be described in.
It should be noted that in addition, above-mentioned key unit 106 can be embodied as respective microprocessor with controller unit 108, preferably, key unit 106 is 8-bit microprocessor, and controller unit 108 is 16 or 32-bit microprocessor, also just say that key unit 106 does not need to possess identical arithmetic capability with controller unit 108, therefore the cost of manufacture of key unit 106 can be lower.But in a further embodiment, key unit 106 and controller unit 108 also can be integrated into a single microprocessor, and the present invention is not for being limited.
In addition, optionally, storage device 100 can have stored value card unit 110 and/or authentication ' unit 112.Stored value card unit 110, for maintaining account balance data (accountbalance), its basic framework can with reference to known stored value card unit, such as, for the description of stored value card unit in U.S. Patent Application Publication No. US2008/0017704.Authentication ' unit 112 is for store digital certification (digitalcertificate) and be supplied to user's terminal 200.About the Content addressable network of digital authenticating, for the description of digital authenticating in the X.509 standard can issued with reference to ITU-T and U.S. Patent Application Publication No. US2009/0198618.
Preferably, stored value card unit 110, authentication ' unit 112, being integrated into single 8-bit microprocessor with key unit 106, and to be controlled by ISO7816 instruction, but the present invention not being for being limited.After more details will be described in.
Fig. 2 is according to the system architecture diagram of the embodiment of the present invention, wherein user's terminal 200 and server 300 link by network 400, need illustrate that network 400 can be the Internet (internet) or internal network (intranet), the present invention is not for being limited.In other embodiments, user's terminal 200 and server 300 also can be directly online.
Fig. 3 is a method flow diagram, and the system coordinating the storage device 100 shown in Fig. 1 to show with Fig. 2, further illustrates the present invention.It should be noted that, step 300 is initialization step to 302, not necessity of the present invention.
< initialization >
● step 300: storage device 100 is linked to user's terminal 200, to set up communication between the two, user's terminal 200 executive utility AP, obtains digital authenticating DC from the authentication ' unit 112 of storage device 100 simultaneously.In general, digital authenticating DC comprises PKI based on public-key cryptography framework (PKI) and user's identification code.
● step 302: application A P, uploaded by digital authenticating DC and be stored to server 300, namely server 300 differentiates the data access relevant with storage device 100 with checking by the user's identification code in digital authenticating DC and signature (being encrypted user's identification code by user's private key) subsequently.It should be noted that, server 300 also can obtain user's PKI and user's identification code by other channel in advance, and the present invention is not for being limited.
< asks digital content >
● step 304: application A P can provide a browse interface, for the digital content data storehouse that user's browser server 300 maintains, and therefrom selects the digital content file DF (being such as a MP3 music file) that will download.The outward appearance of application A P can with reference to the product of AppleInc.
● step 306: application A P points out user that storage device 100 is linked user's terminal 200, and when storage device 100 links with user's terminal 200, application A P asks key unit 106 to provide digital signature (digitalsignature) DS by controller unit 108, and send server 300 to, this digital signature DS its at least comprise the user's identification code utilizing and encrypt with the private key corresponding based on public-key cryptography framework (PKI) PKI that aforementioned server 300 is held.Optionally, this digital signature DS can more comprise a random number, and to increase security, but this is not necessity of the present invention.
In another optionally embodiment, the digital content file DF downloaded needs charge, therefore before application A P transmits digital signature DS to server 300, application A P communicates with stored value card unit 110 by controller unit 108, to check whether the account in stored value card unit 110 has enough remaining sums for paying download digital content file DF; If Sorry, your ticket has not enough value, then application A P can point out user to carry out Stored Value, but necessity of this also non-invention.
● step 308: the PKI that server 300 uses it to have with decrypted digital signature DS to take out user identification code ID and to carry out authentication, if pass through authentication, server 300 provides enciphered data, and wherein enciphered data comprises the signature file SF with the digital content file DF of the first cipher mode encryption and the encryption of the second cipher mode.
In this embodiment, the first cipher mode in order to encrypted digital content file DF can be the symmetry encryption algorithms such as AES or 3DES, but also can be unsymmetrical tridiagonal matrix algorithm, and the present invention is not for being limited.And be preferably the unsymmetrical tridiagonal matrix algorithms such as such as RSA in order to second cipher mode of ciphering signature file SF, and the PKI utilizing server 300 to hold is encrypted, but the present invention is not for being confined to this.
Signature file SF can be XML file, wherein comprises the key in order to decrypts digital content file DF.In one embodiment, decrypts digital content file DF only needs a key K 1 to be supplied to controller unit 108, but in a preferred embodiment, decrypts digital content file DF needs two key K 1 and K2, in order to parts (such as part P1 and part P2) different in Individual encryption digital content file DF, and key K 1 is supplied to controller unit 108 in order to a deciphering wherein part, and key K 2 is supplied to the application A P of user's terminal 200 in order to decipher another part, therefore signature file SF may need to comprise in recording digital content file DF the address date (Offset) needing key K 1 and K2 different piece, after more details will be described in.It is worth mentioning that, key K 1 and K2 dynamically or randomly can be set by server 300, therefore more increase the degree of difficulty cracking encrypted digital content file DF.
Except the key of deciphering, signature file SF separately can comprise the description about digital content file DF, such as copyright statement etc.
In addition, in this step, no matter be digital content file DF or signature file SF, all can be encryption or Partial encryption in full, the present invention is not for restriction.
< download digital content >
● step 310: the application A P of user's terminal 200 downloads enciphered data (namely with the signature file SF that the digital content file DF of the first cipher mode encryption and the second cipher mode encrypt) from server 300, and is stored to the memory cell 104 in storage device 100.In addition, download digital content file DF need charge situation, while this step, also can in stored value card unit 110 account deduction needed for fund.
< decrypted signature file >
● step 312: key unit 106 holds the private key corresponding based on public-key cryptography framework (PKI) PKI held with aforementioned server 300, and utilize this private key signature file DF to be deciphered capture key K 1 (being then key K 1 and key K 2 in a preferred embodiment).In an embodiment, for example, key K 1 and key K 2 can be the binary element code (binarycode) of length-specific separately.In a preferred embodiment, key unit 106 utilizes private key to decipher signature file DF to capture the binary element code that a length is X position, and front Y position is key K 1, then (X-Y) position is key K 2, wherein X and Y is known in advance by key unit 106, but the present invention is not limited to this.
In a further embodiment, key unit 106 does not need decrypted signature file DF to obtain key K 1 and key K 2, and optionally, key unit 106 built-inly in advance can have key K 1 and key K 2, and in the case, signature file DF can omit.
< decrypts digital content file >
● step 314: key unit 106 sends the key K 1 of gained after decrypted signature file DF to controller unit 108, controller unit 108 then utilizes that key K 1 decrypts digital content file DF's is whole, or in a preferred embodiment, controller unit 108 utilizes key K 1 decrypts digital content file DF wherein a part of.And the digital content file (or with part that key K 1 is deciphered) after deciphering is sent to the application A P of user's terminal 200.What deserves to be explained is, because key K 1 only can be transmitted in storage device 100 inside (namely between key unit 106 and controller unit 108), storage device 100 can't be left that therefore there is the security of height.
● step 316: if in step 314, digital content file DF is all deciphered by controller unit 108, then the application A P of user's terminal 200 then directly can play the digital content file DF after deciphering in user's terminal 200; But in a preferred embodiment, controller unit 108 is only with key K 1 decrypts digital content file DF specific part, and application A P need obtain another key K 2 by controller unit 108 to key unit 106 again, with the other parts of decrypts digital content file DF, to obtain the digital content file DF after all deciphering, and play in user's terminal 200.
At this, although key K 2 exports user's terminal 200 to by storage device 100, its path is exposed and has by the risk stolen, but as aforementioned, because key K 1 only can be transmitted in storage device 100 inside (namely between key unit 106 and controller unit 108), steal not easily, even if so only there is key K 2 to be stolen, still whole digital content file DF cannot be deciphered.
In general, the processor (not shown) that the arithmetic capability of controller unit 108 is equipped with not as user's terminal 200, therefore for large-scale digital content file DF (such as film), the part distributing to user's terminal 200 application A P deciphering can have higher ratio compared with the part of being deciphered by controller unit 108, to increase the efficiency of process.For example, the DIR portion in digital content file DF, can be deciphered by controller unit 108, and content part is then deciphered by user's terminal 200 application A P.
When not departing from the present invention's spirit or necessary characteristic, the present invention can be embodied in other specific forms.Described specific embodiment each side only should be considered as illustrative and non-limiting.Therefore, scope of the present invention is as enclosed shown in claim but not as shown in aforementioned explanation.All drop on claim equivalent meaning and scope in change should be considered as within the scope of the claims.

Claims (9)

1. protect a method for digital content, comprise:
(a) one user's exterior of terminal link a digital content storage device, described user's terminal obtains the user's identification code with an encrypted private key from described digital content storage device;
B () described user terminal transmits user's identification code to server of described encryption;
C () described server uses a PKI corresponding with described private key to decipher user's identification code of described encryption, and respond this user's identification code, described server provides an enciphered data, wherein said enciphered data comprises the signature file with a digital content file of one first cipher mode encryption and the encryption of one second cipher mode, and wherein said second cipher mode uses described PKI;
(d) described user terminal from described server download described enciphered data to described digital content storage device; And
E (), in described digital content storage device, carries out the following step:
(ea) with described private key, described signature file is deciphered to capture one first key and one second key;
(eb) part of digital content file according to described first secret key decryption;
(ec) described second key is to described user's terminal;
F () described user terminal is according to the part of not deciphering in described second secret key decryption step (ec).
2. produced a method for protection digital content by a server, comprise:
(a) described server receive that user's terminal sends with user's identification code of an encrypted private key;
B () described server uses a PKI corresponding with described private key to decipher user's identification code of described encryption, and respond this user's identification code, described server provides an enciphered data, wherein said enciphered data comprises the signature file with a digital content file of one first cipher mode encryption and the encryption of one second cipher mode, and wherein said second cipher mode uses described PKI; And
C () described server provides enciphered data described in described user's terminal downloads.
3. a digital content storage device, comprises:
One connecting interface, externally can link user's terminal;
One memory cell, stores an enciphered data, and described enciphered data comprises the signature file with a digital content file of one first cipher mode encryption and the encryption of one second cipher mode;
One key unit, by described signature file deciphering to capture at least one first key and one second key; And
One controller unit, link described memory cell and described key unit respectively, described controller unit controls the communication of described memory cell and described user's terminal room, and digital content file is at least partially according to described first secret key decryption, and transmit described second key to described user's terminal, thus the other parts of described user's terminal digital content file according to described second secret key decryption.
4. storage device according to claim 3, wherein, described key unit is a 8-bit microprocessor, and described controller unit is one 16 or 32-bit microprocessor.
5. storage device according to claim 3, wherein, described second cipher mode based on public-key cryptography framework (PKI), and described key unit produces in advance or have described second cipher mode a private key to decipher described signature file.
6. storage device according to claim 5, wherein, described key unit has user's identification code (ID) in advance, and described key unit also utilizes user's identification code described in described encrypted private key, and sends user's terminal to by described controller unit.
7. storage device according to claim 3, also comprises a stored value card unit, maintains account balance data, and sends described user's terminal to by described controller unit.
8. storage device according to claim 3, also comprises an authentication ' unit, provides a digital authenticating, and sends described user's terminal to by described controller unit.
9. a digital content storage device, comprises:
One connecting interface, externally can link user's terminal;
One memory cell, stores a digital content file of encryption;
One key unit, provides one first key and one second key; And
One controller unit, link described memory cell and described key unit respectively, described controller unit controls the communication of described memory cell and described user's terminal room, and digital content file is at least partially according to described first secret key decryption, and transmit described second key to described user's terminal, thus the other parts of described user's terminal digital content file according to described second secret key decryption.
CN201110247095.3A 2011-08-25 2011-08-25 The method of protection digital content and storage device Expired - Fee Related CN102955916B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110247095.3A CN102955916B (en) 2011-08-25 2011-08-25 The method of protection digital content and storage device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110247095.3A CN102955916B (en) 2011-08-25 2011-08-25 The method of protection digital content and storage device

Publications (2)

Publication Number Publication Date
CN102955916A CN102955916A (en) 2013-03-06
CN102955916B true CN102955916B (en) 2016-03-02

Family

ID=47764707

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110247095.3A Expired - Fee Related CN102955916B (en) 2011-08-25 2011-08-25 The method of protection digital content and storage device

Country Status (1)

Country Link
CN (1) CN102955916B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107657958B (en) * 2017-09-13 2020-06-23 厦门声连网信息科技有限公司 Music identification system, device, music management server and method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200504509A (en) * 2003-07-22 2005-02-01 Yuen Foong Paper Co Ltd Digital content management system, method and application method thereof
TW200640214A (en) * 2005-05-10 2006-11-16 Ruei Invest Co Ltd De Method and system for downloading and authenticating digital copyright
TWI331288B (en) * 2007-01-31 2010-10-01 Phison Electronics Corp Memory card and security method therefor

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7936873B2 (en) * 2007-05-07 2011-05-03 Apple Inc. Secure distribution of content using decryption keys

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200504509A (en) * 2003-07-22 2005-02-01 Yuen Foong Paper Co Ltd Digital content management system, method and application method thereof
TW200640214A (en) * 2005-05-10 2006-11-16 Ruei Invest Co Ltd De Method and system for downloading and authenticating digital copyright
TWI331288B (en) * 2007-01-31 2010-10-01 Phison Electronics Corp Memory card and security method therefor

Also Published As

Publication number Publication date
CN102955916A (en) 2013-03-06

Similar Documents

Publication Publication Date Title
US10361851B2 (en) Authenticator, authenticatee and authentication method
ES2970201T3 (en) Personal identification system with contactless card
US8949626B2 (en) Protection of security parameters in storage devices
ES2632795T3 (en) Payment system
US8239681B2 (en) Information processing device and method, recording medium, program and information processing system
US9100187B2 (en) Authenticator
KR101546204B1 (en) Host device, semiconductor memory device, and authentication method
EP2751732B1 (en) Authenticator, authenticatee and authentication method
US20030163717A1 (en) Memory card
CN101471943B (en) Methods for authenticating a hardware device and providing a secure channel to deliver data
CN103684786A (en) Method and system for storing digital certificate and binding digital certificate to hardware carrier
CN102737180A (en) Integrated circuit for digital rights management
CN101536007A (en) Method and system for encryption of information stored in an external nonvolatile memory
CN107846396A (en) Memory system and binding method between memory system and host
CN103914662A (en) Access control method and device of file encrypting system on the basis of partitions
CN113168475B (en) Securing external data storage of secure elements integrated on a system-on-chip
US8181869B2 (en) Method for customizing customer identifier
CN103370718B (en) Use the data guard method of distributed security key, equipment and system
CN105308611B (en) Automated content signature for the point of sale application in oiling circumstance
US20120124386A1 (en) Method and System for Refreshing Content in a Storage Device
CN101174941A (en) Off-line digital copyright protection method and device for mobile terminal document
CN102955916B (en) The method of protection digital content and storage device
JP4670585B2 (en) Setting apparatus and method, and program
JP4918133B2 (en) Data storage method, client device, data storage system, and program
TWI473488B (en) Method and storage device for protecting digital content

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160302

Termination date: 20210825